From b64c6285f75e6a56c42ec939a73feb0fe880b9a7 Mon Sep 17 00:00:00 2001 From: Jonas Kvinge Date: Mon, 11 Oct 2021 18:44:48 +0200 Subject: [PATCH] tls: Fix typos in source code comments MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Change-Id: Iec42e4d0f3476bd421861a0139731ff89788ee23 Reviewed-by: Timur Pocheptsov Reviewed-by: MÃ¥rten Nordheim --- src/plugins/tls/openssl/qtls_openssl.cpp | 2 +- src/plugins/tls/openssl/qtls_openssl_p.h | 2 +- src/plugins/tls/openssl/qwindowscarootfetcher.cpp | 2 +- src/plugins/tls/shared/qx509_generic.cpp | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/src/plugins/tls/openssl/qtls_openssl.cpp b/src/plugins/tls/openssl/qtls_openssl.cpp index 5a9a55ebbd..569e1d9c84 100644 --- a/src/plugins/tls/openssl/qtls_openssl.cpp +++ b/src/plugins/tls/openssl/qtls_openssl.cpp @@ -333,7 +333,7 @@ int qt_OCSP_status_server_callback(SSL *ssl, void *ocspRequest) return SSL_TLSEXT_ERR_ALERT_FATAL; std::copy(response.data(), response.data() + response.size(), derCopy); - // We don't check the return value: internally OpenSSL simply assignes the + // We don't check the return value: internally OpenSSL simply assigns the // pointer (it assumes it now owns this memory btw!) and the length. q_SSL_set_tlsext_status_ocsp_resp(ssl, derCopy, response.size()); diff --git a/src/plugins/tls/openssl/qtls_openssl_p.h b/src/plugins/tls/openssl/qtls_openssl_p.h index 9e7283b15d..60dae884fc 100644 --- a/src/plugins/tls/openssl/qtls_openssl_p.h +++ b/src/plugins/tls/openssl/qtls_openssl_p.h @@ -144,7 +144,7 @@ private: QList ocspResponses; - // This decription will go to setErrorAndEmit(SslHandshakeError, ocspErrorDescription) + // This description will go to setErrorAndEmit(SslHandshakeError, ocspErrorDescription) QString ocspErrorDescription; // These will go to sslErrors() QList ocspErrors; diff --git a/src/plugins/tls/openssl/qwindowscarootfetcher.cpp b/src/plugins/tls/openssl/qwindowscarootfetcher.cpp index 45ecbce258..614f907fac 100644 --- a/src/plugins/tls/openssl/qwindowscarootfetcher.cpp +++ b/src/plugins/tls/openssl/qwindowscarootfetcher.cpp @@ -84,7 +84,7 @@ const QList buildVerifiedChain(const QList &ca // by setting custom CA certificates. We convert wincrypt's // structures in QSslCertificate and give OpenSSL the second // chance to verify the now (apparently) complete chain. - // In addition, wincrypt gives us a benifit of some checks + // In addition, wincrypt gives us a benefit of some checks // we don't have in OpenSSL back-end. Q_ASSERT(chainContext); diff --git a/src/plugins/tls/shared/qx509_generic.cpp b/src/plugins/tls/shared/qx509_generic.cpp index f5fd1b6b30..5e06c765e1 100644 --- a/src/plugins/tls/shared/qx509_generic.cpp +++ b/src/plugins/tls/shared/qx509_generic.cpp @@ -295,7 +295,7 @@ bool X509CertificateGeneric::parse(const QByteArray &data) // subjectAltName // Note, parseExtension() returns true for this extensions, - // but considers it to be unsupported and assignes a useless + // but considers it to be unsupported and assigns a useless // value. OpenSSL also treats this extension as unsupported, // but properly creates a map with 'name' and 'value' taken // from the extension. We only support 'email', 'IP' and 'DNS',